Securing Highly-Sensitive Information In Smart Mobile Devices Through Difficult-To-Mimic And Single-Time Usage Analytics

PROCEEDINGS OF THE 15TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS 2018)(2018)

引用 0|浏览6
暂无评分
摘要
The ability of smart devices to recognize their owners or valid users gains attention with the advent of widespread highly sensitive usage of these devices such as storing secret and personal information. Unlike the existing techniques, in this paper, we propose a very lightweight single-time user identification technique that can ensure a unique authentication by presenting a system near-to-impossible to breach for intruders. Here, we have conducted a thorough study over single-time usage data collected from 33 users. The study reveals several new findings, which in turn, leads us to a novel solution exploiting a new machine learning technique. Our evaluation confirms that the proposed solution operates with only 5% False Acceptance Rate (FAR) and only 6% False Rejection Rate (FRR) over the data collected from 33 users. We further evaluate the performance through comparing its performance with some existing machine learning techniques. Finally, we perform a real implementation of our proposed solution as a mobile application to conduct a rigorous user evaluation over 27 participants using three different devices in order to show how the solution works in practical situations. Outcomes of the user evaluation demonstrate as low as 0% FAR after letting intruders to mimic the actual user, which ensures extremely low probability of being breached. Moreover, we let 2 users to continuously use our application over 25 days in different states during their operation. Outcomes of this evaluation demonstrate as low as 1% FRR confirming the usability of our technique in long-term usage.
更多
查看译文
关键词
Smartphone, Behavioral biometrics, Security, Mean-SD Clustering
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要